# Advisory on CVE-2024-10220

## Arbitrary command execution through gitRepo volume

On November 20, 2024, the Kubernetes Security Response Committee disclosed a vulnerability that could allow a user with the ability to create a pod and associate a gitRepo volume to execute arbitrary commands beyond the container boundary.

The Kubernetes Security Response Committee assigned this vulnerability the CVE ID [<mark style="color:blue;">CVE-2024-10220</mark>](https://nvd.nist.gov/vuln/detail/CVE-2024-10224) and classified it as **High** severity with a CVSS score of **8.1**.

## Impacted IONOS Cloud Products

| Product Ranges | Product                                                                                        | Impacted | Mitigated | Patch Status |
| -------------- | ---------------------------------------------------------------------------------------------- | -------- | --------- | ------------ |
| Containers     | [<mark style="color:blue;">Managed Kubernetes</mark>](/cloud/containers/managed-kubernetes.md) | Yes      | Yes       | User         |

{% hint style="warning" %}
**Warning:** To mitigate this issue, you must update your Managed Kubernetes instance to a non-vulnerable version. For more information, see [<mark style="color:blue;">What action can you take to mitigate the vulnerability?</mark>](#what-action-can-you-take-to-mitigate-the-vulnerability)
{% endhint %}

## Risk on IONOS Cloud environment

IONOS Cloud infrastructure and services do not utilize the vulnerable versions of Managed Kubernetes, so they are not impacted.

## What action can you take to mitigate the vulnerability?

If you use affected Managed Kubernetes versions, upgrading your clusters to one of the following fixed versions is recommended:

| Affected Versions                                                                                                                     | Fixed Versions                                                                                               |
| ------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------ |
| <p>- <code>v1.30.0</code> to <code>v1.30.2</code><br>- <code>v1.29.0</code> to <code>v1.29.6</code><br>- <code><= v1.28.11</code></p> | <p>- <code>v1.31.0</code><br>- <code>v1.30.3</code><br>- <code>v1.29.7</code><br>- <code>v1.28.12</code></p> |

## How can I get help?

If you have further questions or concerns about this vulnerability, contact [<mark style="color:blue;">IONOS Cloud Support</mark>](https://docs.ionos.com/cloud/support/general-information/contact-information).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.ionos.com/cloud/security-safeguards/vulnerability-register/2024/cve-2024-10220.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
